Host Unknown presents: I'm a C I Double S P (CISSP Parody)

Lost All The Money

| | Blog, security, video
After a several year hiatus, many creative differences, multiple instances of rage-quitting, and several occasions of ghosting so good that Patrick Swayze would have been proud – the group I founded, Host ...
[Video] Incident Investigation with Uptycs and Osquery

[Video] Incident Investigation with Uptycs and Osquery

This video features Pat Haley, our Principal Sales Engineer, walking through the strengths + challenges of osquery, how osquery can be used for incident investigations, and how Uptycs can add value to ...
Zoom Spying Vulnerability: The Plot Thickens

Zoom Spying Vulnerability: The Plot Thickens

White-label versions of Zoom come with the same bug as Apple patched last week. Time to patch again ...
Security Boulevard
Joining KnowBe4 and going on a road trip

The Curse of Erich

| | video
At first I thought it was an exaggeration. A story that had got out of hand. But after spending over 72 hours travelling with Erich Kron, I do believe he is cursed ...

Video: From Dev to InfoSec: #MyInfoSecStory

A Roadmap to a Cyber Security Career! Video and Slide Deck from EH-Net Live! Feb 2019 It’s pretty clear that the skills gap in the InfoSec industry is a real thing with ...
Stories from Inside the Security Operations Command Center.

New Video Series: How a Security Operations Command Center Took On the Largest Attacks the Internet Has Ever Seen

The point is, Internet security is critical to the largest organizations, banks, corporations, and governments around the globe. But it's also critical to the small or mid-sized start up ...

Video: A Perfect Crime: The Tech and Psych of Effective Phishing

See the Attack They Can't Refuse! Video and Slide Deck from EH-Net Live! Jan 2019 The InfoSec industry has done a pretty good job over the last couple of decades in protecting ...
Network Diagram

Video: TrickBot and ETERNALCHAMPION

This video tutorial is a walkthrough of how you can analyze the PCAP file UISGCON-traffic-analysis-task-pcap-2-of-2.pcap (created by Brad Duncan). The capture file contains a malicious Word Document (macro downloader), Emotet (banking trojan), ...
Business Must Change: InfoSec in 2019

Business Must Change: InfoSec in 2019

I don't know about you, but I am happy to see 2018 ended. Personally, it was a very difficult year, capping a very difficult decade. Now, as we embark into 2019, it's ...
Overcoming OpenStack Obstacles for vCDN at the Edge

Overcoming OpenStack Obstacles for vCDN at the Edge

Akamai and Wind River have collaborated to provide a validated, joint solution for virtual CDN services delivered with the reliability, scalability, and edge-optimized footprint that are required for cost-effective deployments in telecom ...
Loading...